You will identify the IT system assets of the system architecture of your organization.These can be fictitious or modeled after existing architectures. Be sure to cite using APA format. You will identify threats and vulnerabilities to IT system assets and the security mechanisms used to address them.
|IT System Assets
|Threats and Vulnerabilities
|Security Mechanisms to Address Threats and Vulnerabilities